NEW QUESTION 265Drag and DropA company runs multiple line-of-business applications in a Kubernetes container cluster. Source code for the applications resides in a version control repository which is a part of a continuous integration/continuous deployment (CI/CD) solution. You must be able to upgrade containerized applications without downtime after all tests and reviews have completed successfully. You need to recommend steps to go from source code to updated applications so that they can be automated in the CI/CD solution. Which four actions should you recommend be performed in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:

NEW QUESTION 266HotspotYou are designing a solution that consist of Internet of Things (IoT) devices and external streams of data. You need to provide near real-time functionality. Which technologies should you implement? (To answer, configure the appropriate options in the dialog box in the answer area. NOTE: Each correct selection is worth one point.)

NEW QUESTION 267HotspotYou are managing the automation of your company's Azure resources. You need to choose the appropriate tool to automate specific use cases. Which tool should you choose for each use case? (To answer, select the appropriate tool from each list in the answer area. NOTE: Each correct selection is worth one point.)

NEW QUESTION 268Drag and DropYou are designing a solution that ingests, transforms, and stores streams of data from Internet of Things (IoT) devices. The solution has the following requirements:- Business users must be able to discover, understand, consume, and contribute to data creation.- Transform data by using Spark.- Data analysis must be performed by using a hub-and-spoke business intelligence model.You need to choose the appropriate products for the solution. Which technologies should you recommend? (To answer, drag the appropriate technologies to the correct requirements. Each technology may be used once, more than one, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point.)

NEW QUESTION 269Drag and DropYou are designing an Azure storage solution for a company. The company has the following storage requirements:- An app named App1 uses data analytics on stored data.- App1 must store data on a hierarchical file system that uses Azure Active Directory (Azure AD) access control lists.- An app named App2 must have access to object-based storage.- The storage must support role-based access control and use shared access signature keys.You need to design the storage solution. Which storage solution should you use for each app? (To answer, drag the appropriate storage solutions to the correct apps. Each storage solution may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content. NOTE: Each correct selection is worth one point.)

Case Study 9 - Trey Research Inc. (NEW QUESTION 271 - NEW QUESTION 276)BackgroundYou are an architect for Trey Research Inc., a software as a service (SaaS) company. The company is developing a new product named Tailspin for consumer and small business financial monitoring. The product will be offered as an API to banks and financial instructions. Banks and financial institutions will integrate Tailspin into their own online banking offerings. All employees of Trey Research are members of an Active Directory Domain Services (AD DS) group named TREY.More ......

NEW QUESTION 271You need to ensure that authentication requirements are met. What should you do?

NEW QUESTION 272You are developing the application security review document. You need to ensure that application data security requirements are met. What should you verify?

A. Azure SQL connections use an account that does have administrative access.B. Connection strings use encryption and not trust server certificates.C. Azure SQL connections use Azure Key Vault certificates for TLS.D. Connection strings are not stored in application code.